Course description
News of large-scale cybersecurity threats and cyberattacks dominate the headlines all too often in the Information Age: hackers exploiting vulnerabilities of retail giants, foreign influence in elections, and new forms of ransomware underscore the importance of preparing for these types of emerging threats.
Businesses, governments, financial institutions, and public sector organizations collect, store, and process vast amounts of sensitive and valuable data. These organizations have now become targets of groups seeking to wreak havoc on vulnerable systems and potentially disrupting everyday business functions. As a result, cyber risk management has become a fundamental component of business operations, and understanding and mitigating risk has become an essential skill for business leaders, thought leaders, analysts, as well as security and technology specialists.
Cybersecurity: Managing Risk in the Information Age is a course that equips students with a comprehensive understanding of how to identify and manage operational risk, litigation risk, and reputational risk. The course will help articipants assess and mitigate specific vulnerabilities within an organization’s networks, systems, and data in order to provide the knowledge and skills to protect the integrity, security, and confidentiality of their digital assets.
Upcoming start dates
Suitability - Who should attend?
Cybersecurity: Managing Risk in the Information Age training course is designed for:
- Leaders at all levels who must pilot their organization through the complexity of a dynamic cybersecurity environment and mobilize appropriate resources to maintain stable business operations.
- Technology specialists aspiring to a leadership role, as well as security experts who need to upskill in such a rapidly evolving field.
- Management professionals, analysts, and technical writers who must interpret and communicate the implications of cyber threats to stakeholders will benefit from thisprofessional development experience.
Outcome / Qualification etc.
At the end of the Cybersecurity: Managing Risk in the Information Age trai ning course, you will be able to:
- You'll be shown how to critically analyze an organization’s risk profile, not only taking into account possible threats, but also the governance structure. and systems that have, or have not, been put in place to manage cyber risk.
- You'll also explore recommended strategies for responding to a cyberattack, starting with identifying and communicating detection of a security breach, to ensuring that the attack is contained to prevent further damage.
- You will also draw your attention to the legal and compliance regulations that ensure organizations remain compliant with both preventative and reporting requirements.
- You'll have developed the appropriate knowledge to design and successfully implement a risk mitigation strategy for an organization.
Training Course Content
Day 1
Cybersecurity Risk is Business Risk
- Define the key concepts necessary to understand the function of cyber risk management.
- Discuss why the current cyber landscape poses a threat to organizations' cybersecurity.
- Explain how cyber risk management can protect organizations from cyber risks.
- Identify the three principal risks of a cyber attack.
- Show how cyber risk management mitigates the business risk of cyberattacks.
Day 2
Identifying Cyber Threats
- Demonstrate how the internet works.
- Illustrate a method of cyber attack.
- Identify types of threat actors.
- Discuss sectors typically targeted by cyber threat actors.
- Relate the increasing prevalence of cyber attacks to current geopolitical tensions.
- Identify risks posed by insider threat actors.
- Investigate the threats to an organization's critical business systems and data.
Day 3
Identifying Important Business Systems and Assets
- Discuss the importance of protecting an organization's critical assets.
- Identify the critical systems that are vulnerable to cyberattack.
- Identify types of networks and their vulnerabilities.
- Choose the types of data that should be prioritized when securing an organization's networks.
- Investigate the business critical systems, networks, and data that are essential for an organization's effective functioning.
- Assess the vulnerabilities of an organization's business critical systems, networks, and data.
Day 4
The Role of Leadership in Managing Cyber Risk
- Outline the importance of leadership in cybersecurity governance.
- Discuss the importance of effective management processes.
- Articulate management processes that are crucial to managing cyber risk for an organization.
- Investigate the need for cybersecurity awareness training.
- Recommend a cybersecurity leadership plan for an organization
Day 5
Understanding Your Technology
- Identify the important nexus between physical security and cybersecurity.
- Articulate the types of questions needed to establish an overview of an organization's cybersecurity.
- Describe types of technologies that effectively protect networks.
Day 6
Identify the key elements of sound data governance
- Apply appropriate methods for protecting an organization's systems, networks, and data.
- Deduce types of questions necessary to determine the technologies implemented in an organization's cybersecurity.
Day 7
Cyber Risk and The Law
- Recognize the risk of failing to take into account legal considerations surrounding cybersecurity.
- Identify the various sources of legal obligations and best practice standards.
- Articulate ways to mitigate legal and reputational risks.
- Interpret the role of the government in regulating cybersecurity.
- Illustrate the benefits of disclosure and information sharing following a breach.
- Identify the legal risks inherent in third-party relationships.
- Select questions to assess an organization's legal and compliance cyber risks.
Day 8
Incident Response and Accountability
- Recognize proactive measures that should contribute to an incident response strategy.
- Identify best practices in detecting and containing a cyber attack.
- Analyze the roles of key actors in the response to a cyber attack.
Day 9
Articulate the appropriate communication strategy following a cyber attack
- Decide on processes to eradicate an attack, and recover affected systems,networks, and data.
- Evaluate the effectiveness of the actions taken during a cyberattack.
- Propose an incident response plan to prepare an organization in the event of an attack.
Day 10
Designing and Implementing a Mitigation Strategy
- Identify cyberthreats and mitigation strategies of future cyber landscapes.
- Review the components included in a risk mitigation strategy.
- Interpret challenges inherent in implementing a cyber risk mitigation strategy.
- Select metrics that are most appropriate for evaluating the cybersecurity of an organization or sector.
- Develop a cyber risk mitigation strategy specific to your organization.
Request info
London Premier Centre
London Premier Centre is a UK leading training provider based in London and specialises in international short courses. Our inspiring, comprehensive portfolio of more than 400 professional development courses and seminars covers a wide range of professions from Administration, Leadership,...